Locky ransomware is back: What's that mean for you?

Home Forums UFAA Discussion Forum Computer / Technology Locky ransomware is back: What's that mean for you?


This topic contains 0 replies, has 1 voice, and was last updated by ufaaadmin ufaaadmin 9 months, 3 weeks ago.

Viewing 1 post (of 1 total)
  • Author
  • #4556

    Posted: April 21, 2017 by Malwarebytes Labs
    Last updated: April 25, 2017

    In our Q1 2017 Tactics and Techniques report, we mentioned that the Locky ransomware had mysteriously vanished. Indeed, for a while, it completely disappeared and allowed for Cerber to take the number one spot as the most distributed piece of ransomware (and malware for that matter).

    However, the group controlling the Necurs botnet has just opened the spam floodgates again and is pumping out fake documents that deliver the nasty Locky ransomware right before going into the weekend.

    PDF to Word Macro

    The ransomware is dropped following a distribution method we have been seeing more of recently with Dridex which involves embedding a Word document within a PDF file.

    While this may seem like an unnecessary extra step, it actually allows to bypass sandboxes. Once the user clicks the OK button, the rogue Word document is displayed:

    This last step requires a bit of social engineering to execute a malicious macro that will download the actual Locky ransomware.

    Personal files are encrypted with the .osiris extension and the crooks are asking 0.5 Bitcoin ($623 at the time of writing) to recover them.


    The attack relies on users opening up malicious attachments that will appear legitimate. Many studies have shown that users are often the weakest link in an attack chain and criminals know that too well.

    Malwarebytes protects against this attack at various layers including macro and ransomware mitigation, and neither of those required any signature update.

    link: https://blog.malwarebytes.com/cybercrime/2017/04/locky-ransomware-is-back-but-we-already-protect-against-it/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-B2C-2017-May-newsletter-issue1&utm_content=locky-ransomware

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.